While considering different aspects dealing with ethical hacking into system, we do confront with many facets of testing own security system and in this segment the special emphasis is to find out the loopholes and then fill those with security patches. When we venture into an alien system of the three aspects that come into Continue Reading »
A random selection of my writing
- SUPPORT FOR WINDOWS 98
- When flow of data becomes larger than the radius of space?
- The Windows Management Framework Core package for IT Professionals
- Better safe than sorry : 1
- Blog This! (by Google)
- How do I add/remove my Twitter and Facebook accounts to/from my bit.ly account?
- Build your own robot-Introduction to robotics
- Sedentary geometry
- premature sad demise of our beloved, learned faculty of human resources
- Description of the Outlook 2003 Junk E-mail Filter update: March 10, 2009
- ORIYA TO ENGLISH NAMES OF VEGETABLES
- ORIYA TO ENGLISH NAMES OF FRUITS / PULSES
- How do I fix my micro SD card that became a read-only memory card?
- ORIYA TO ENGLISH NAMES OF SEEDS
- How to repair electrical goods?
- Blog Instantly Using Only Email
- Google Pixel XL Review
- Oriya (Odia) to English names for pulses, cereals, spices, grains
- How Space Elevators Will Work?
- The definitive guide to WordPress security